Sciweavers

1407 search results - page 157 / 282
» Systems Theory Model for Information Security
Sort
View
CCS
2005
ACM
14 years 1 months ago
An auctioning reputation system based on anomaly
Existing reputation systems used by online auction houses do not address the concern of a buyer shopping for commodities—finding a good bargain. These systems do not provide in...
Shai Rubin, Mihai Christodorescu, Vinod Ganapathy,...
ISI
2002
Springer
13 years 8 months ago
Getting right answers from incomplete multidimensional databases
Dealing with large volumes of data, OLAP data cubes aggregated values are often spoiled by errors due to missing values in detailed data. This paper suggests to adjust aggregate an...
Sabine Goutier, Georges Hébrail, Vér...
CCS
2005
ACM
14 years 1 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
ICALT
2007
IEEE
14 years 2 months ago
The Web 2.0 Driven SECI Model Based Learning Process
Nonaka and his knowledge transformation model SECI revolutionized the thinking about organizations as social learning systems. He introduced technical concepts like hypertext into...
Mohamed Amine Chatti, Ralf Klamma, Matthias Jarke,...
IAT
2005
IEEE
14 years 1 months ago
An Approximate Pareto Optimal Cooperative Negotiation Model for Multiple
Cooperative negotiation is proved to be an effective paradigm to solve complex dynamic multi-objective problems in which each objective is associated to an agent. When the multi-o...
Nicola Gatti, Francesco Amigoni